Have I Been Pwned warns that an alleged data breach compromised the private data of 56,904,909 Hot Topic, Box Lunch, and Torrid users. Hot Topic is an American retail franchise that specialises in counterculture-themed clothes, accessories, and licensed music…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Addressing AI Risks: Best Practices for Proactive Crisis Management
An essential element of effective crisis management is preparing for both visible and hidden risks. A recent report by Riskonnect, a risk management software provider, warns that companies often overlook the potential threats associated with AI. Although AI offers…
Volt Typhoon rebuilds malware botnet following FBI disruption
There has recently been a rise in the botnet activity created by the Chinese threat group Volt Typhoon, which leverages similar techniques and infrastructure as those previously created by the group. SecurityScorecard reports that the botnet has recently made…
New TSA Rules to Boost Cybersecurity in Transport
The Transportation Security Administration recently unveiled a proposed rule that would permanently codify cybersecurity reporting requirements in certain segments of U.S. transportation, including pipelines and railroads. This change is set to be permanent after the agency introduced temporary reporting requirements…
Chrome Extensions Continue to Pose a Threat, Even With Google’s Manifest V3
Users have always found browser extensions to be a useful tool for increasing productivity and streamlining tasks. They have, however, become a prime target for malicious actors attempting to exploit flaws, impacting both individual users and companies. Despite efforts…
Texas Oilfield Supplier Operations Impacted by Ransomware Incident
About two months before the Newpark Resources attack, oilfield services giant Halliburton had been afflicted with a cyberattack that it then disclosed in a regulatory filing, which occurred about two months earlier. Last week, Halliburton, the world’s largest energy…
WHO and Global Leaders Warn Against Rise of Ransomware Attacks Targeting Hospitals
On November 8, the World Health Organization (WHO) joined over 50 countries in issuing an urgent warning at the United Nations about the increase in ransomware attacks on healthcare systems worldwide. WHO Director-General Tedros Adhanom Ghebreyesus addressed the UN…
Critical Security Flaw in SEIKO EPSON Devices Allows Unauthorized Access
A recent security vulnerability identified as CVE-2024-47295 poses a serious risk for several SEIKO EPSON devices, potentially granting attackers administrative control. This vulnerability stems from a weak initial password setup within SEIKO EPSON’s Web Config software, which manages network…
North Korean Hackers Employ macOS Malware to Target Crypto Firms
BlueNoroff, a North Korean threat actor, has been attacking crypto firms with a new multistage malware for macOS systems. According to the researchers, the campaign is known as Hidden Risk, and it lures victims with emails that include fake…
Global Companies Targeted by “CopyR(ight)hadamantys” Phishing Scam Using Advanced Infostealer Malware
Hundreds of organizations worldwide have recently fallen victim to a sophisticated spear-phishing campaign, where emails falsely claiming copyright infringement are used to deliver an advanced infostealer malware. Since July, Check Point Research has tracked the distribution of these emails…
Supreme Court Weighs Shareholder Lawsuit Against Meta Over Data Disclosure
The U.S. Supreme Court is deliberating on a high-stakes shareholder lawsuit involving Meta (formerly Facebook), where investors claim the tech giant misled them by omitting crucial data breach information from its risk disclosures. The case, Facebook v. Amalgamated Bank,…
Browser Warning: Fake Websites Steal Millions from Users
Cyber scammers give new warnings as they do not stop scamming unsuspecting web shoppers through a new phishing campaign posing to be online stores. Many of these fake stores Google has removed from its search results, but links remain…
Veeam RCE Bug Now a Target for Frag Ransomware Operators
Recently, a critical VBR (Veeam Backup & Replication) security flaw was exploited by cyber thieves to distribute Frag ransomware along with the Akira and Fog ransomware attacks. Florian Hauser, a security researcher with Code White, has discovered that the…
600 Million Daily Cyberattacks: Microsoft Warns of Escalating Risks in 2024
Microsoft emphasized in its 2024 annual Digital Defense report that the cyber threat landscape remains both “dangerous and complex,” posing significant risks to organizations, users, and devices worldwide. The Expanding Threat Landscape Every day, Microsoft’s customers endure more than 600…
Hacker Claims to Publish Nokia Source Code
The Finnish telecoms equipment firm Nokia is looking into the suspected release of source code material on a criminal hacking site. See also: Gartner Market Guide for DFIR Retainer Services. An attacker going by the handle “IntelBroker,” who is…
Cyberattack Impacts Georgia Hospital, Colorado Pathology Services
The number of hospitals that have been affected by ransomware, business email compromise, and other cyber threats is increasing across all sectors, from small community hospitals such as Memorial Hospital and Manor in Bainbridge, Georgia, to those with a…
How to Prevent a Ransomware Attack and Secure Your Business
In today’s world, the threat of cyberattacks is an ever-present concern for businesses of all sizes. The scenario of receiving a call at 4 a.m. informing you that your company has been hit by a ransomware attack is no…
Growing Use of Winos4.0 Toolkit Poses New Threat to Windows Users
Advanced hacking toolkit Winos4.0 spreads across the globe, security experts warn. Originally reported by Trend Micro, this new toolkit-just like known kits Cobalt Strike and Sliver-was connected to a string of recent cyber attacks in China, having initially spread…
Windows PCs at Risk as SteelFox Malware Targets Driver Vulnerabilities
Several experts have warned that hackers are using malware to attack Windows systems with the intention of mining cryptocurrency and stealing sensitive information from their devices. The latest Kaspersky Security Report claims to have spotted tens of thousands of…
Game Emulation: Keeping Classic Games Alive Despite Legal Hurdles
For retro gaming fans, playing classic video games from decades past is a dream, but it’s tough to do legally. This is where game emulation comes in — a way to recreate old consoles in software, letting people play vintage…